Maintaining Service Levels with APM in Virtualized & Cloud Environments

Significant changes in IT infrastructure approaches are driving data centers towards high levels of efficiency and automation. Virtualization and public/private/hybrid cloud architectures can help reduce costs and simplify administration, but the primary goal for IT organizations is to ensure that the applications and services they deliver meet or exceed their users’ needs. This presentation will provide advice and recommendations that focus on end-to-end monitoring and management of highly virtualized and cloud infrastructure components, including user experience, storage, networking, and hypervisors.

The concept of “shift left” engages security earlier in the development cycle of cloud-native applications, accelerating development while reducing risk. However, migrating to cloud-native environments also necessitates the security team to “shift up”, focusing on the application layer to account for the shared-service model and “thin OS” environments that are prevalent in these environments.

With today's enterprises leveraging around 1000 applications and multiple clouds, application security is becoming a key area of focus. Application security testing is being integrated into the DevOps process early on, while automation, speed and coverage and becoming critical to the success of DevSecOps programs.

Join this interactive panel of industry experts to learn more about:
- Why application security is critical
- Key principles for building application security into DevOps
- Best practices for leveraging automation
- Speed vs Security: Where do you draw the line?
- Recommendations for improving security in 2019

Kubernetes (k8s) is an open-source system for automating the deployment, scaling, and management of containerized applications. Kubernetes promises simplified management of cloud workloads at scale, whether on-premises, hybrid, or in a public cloud infrastructure, allowing effortless movement of workloads from cloud to cloud. By some reckonings, it is being deployed at a rate several times faster than virtualization.

In this presentation, we’ll introduce Kubernetes and present use cases that make clear where and why you would want to use it in your IT environment. We’ll also focus on the enterprise requirements of orchestration and containerization, and specifically on the storage aspects and best practices.

•What is Kubernetes? Why would you want to use it?
•How does Kubernetes help in a multi-cloud/private cloud environment?
•How does Kubernetes orchestrate & manage storage? Can Kubernetes use Docker?
•How do we provide persistence and data protection?
•Example use cases

Containers are a big trend in application deployment. The landscape of containers is moving fast and constantly changing, with new standards emerging every few months. Learn what’s new, what to pay attention to, and how to make sense of the ever-shifting container landscape.

This live webcast will cover:
•Container storage types and Container Frameworks
•An overview of the various storage APIs for the container landscape
•How to identify the most important projects to follow in the container world
•The Container Storage Interface spec and Kubernetes 1.13
•How to get involved in the container community

Learn from industry-leading Cloud Strategist Jeffrey Deverter how to modernize your applications using continuous deployment and continuous integration on the Cloud.

Jeffrey will discuss a methodology that will enable you to modernize applications to reap several business benefits - including Agile improvements, transparency into the true cost of ownership of application operation - and share advice on how to drive business value and the direction of applications.

With sensitive data residing everywhere, organizations becoming more mobile, and the breach epidemic growing, the need for advanced identity and data protection solutions has become even more critical.

Learn about Data Protection solutions for enterprise.

Learn about the new trends in Data Masking, Tokenization and Encryption.

Learn about new Standards for masking from ISO and NIST.

Learn about the new API Economy and how to control access to sensitive data — both on-premises, and in public and private clouds.

The contemporary code review practice has been adopted by many organizations and open source projects as a quality assurance measure. This process typically involves software tools such as Review Board and the time of one or more peer reviewers.

However, there is a growing body of empirical research about this broadly‐adopted practice that can help us learn more about the effects of code reviews on software quality. Available research shows that in fact, peer code reviews are better suited for knowledge sharing and code improvements, rather than for eliminating code defects or reducing error rates. The effectiveness of the process seems to depend on the experience of the reviewer with the code, the size of the change set, and the rate at which the review is conducted.

In this talk, Nikolai will share how the LinkedIn Flagship Product Engineering team leverages the code review process to spread organizational knowledge and uplevel individual contributors. I will also discuss the tools we’ve built to support this practice across a team which spans three offices, four development stacks, dozens of teams, and hundreds of individual contributors.

How fast can you build out a new security microservices? Building a security pipeline that scales with your development and operations team is achievable by creating security microservices that can be programmed in a variety of languages, cloud agnostic and infinitely scale.

In this talk, Aaron will walk through the process of building a security automation pipeline starting with building containers in the first iteration and then moving to OpenFaaS to create simple Serverless functions. Building security automation into your program is essential in building out a scalable security services.

As a highly technical expert, you have been successful because of your expert skills. People hire and promote you because of your talent and ability to solve hard problems. This is true. It's also not enough.
What no one tells you is that you're only looking at one of the three factors that lead to career success.
In this session, you will:
- Learn the other two factors (and what you should do about them)
- Learn the four levels of thinking needed to be an expert who leads
- Assess where you are in each of the areas
- Identify at least 2 practical things that you can do to improve your influence, get more support for your ideas and projects and gain more respect as a professional.

- A significantly more productive IDE for Serverless computing
- How to develop an end-to-end Serverless application in a few minutes
- How to build, test and deploy applications without leaving the IDE
- Work hands-on with the AWS API Gateway, Lambda, DynamoDB and S3
- Learn about upcoming features - Serverless security and monitoring

Most people think “adopting containers” means deploying Docker images to production. In practice, adopting containers in the continuous integration process provides visible benefits even if the production environment are VMs. In this webinar, we will explore this pattern by packaging all build tools inside Docker containers. Container-based pipelines allow us to create and reuse building blocks to make pipeline creation and management MUCH easier. It’s like building with Legos instead of clay.

This not only makes pipeline creation and maintenance much easier, it also solves a myriad of classic CI/CD problems such as:
Putting an end to version conflicts in build machines
Eliminating build machine management in general
Step portability and maintenance

In a very real sense, Docker-based pipelines reflect lessons learned from microservices in CI/CD pipelines. We will share tips and tricks for running these kinds of pipelines while using Codefresh as a CI/CD solution as it fully supports pipelines where each build step is running on its own Docker image.

Most often developers are spending hours of their valuable time in deploying their application, tweaking the environment to make their apps work and monitoring them to ensure that they have enough resources to run smoothly. This reduces productivity. Developers are responsible for doing the more important task of making intelligent & user friendly apps and software solutions.

It is about time that you leverage a platform that helps in automating the process of scaling your cloud environment with intelligent rules. This ensures that your cloud platform always has sufficient resources to operate smoothly at all times & you only pay for what you use (and not pay for limits or unused portions of flat rates). Additionally, we will also walk through the easy & zero code change deployment, secure containerised setup & self service dashboard to help you address familiar business problems like:

"In the age of breaches, enterprises are looking to understand the security and compliance risks associated with data stored in, and accesible from, cloud applications so they can better prepare should the unthinkable happen. With data and workloads moving to the cloud, securing the enterprise is more critical than ever.

Join cloud, security and compliance experts as they discuss:
- How to proactively analyze security risk from the business perspective
- What you need to know about your data, and how to ensure it is compliant when in the cloud
- How to automate security policy changes
- Top challenges for CISOs and CIOs
- Achieving security and compliance across multiple clouds
- Steps to take today"

Brought to you by the Vivit Testing Quality and ALM Special Interest Group (SIG).

In this webinar, you will learn about how Southern Company approaches automating testing, the automated testing framework we created, why we created it, and how it has been used. There will also be a demonstration of UFT being used to run tests using the framework.

Some key take-aways from this webinar will include ideas the following:

• Approaches to automated testing
• How to create a framework that most anyone can understand how to use
• How to create a framework with very readable instructions that can be used for manual testing and automated testing
• How to start building tests in advance of the application or new application elements (buttons, links, input boxes, etc.) being available
• Ways to create automated test result reports

Kick off the new year with a new SNIA Persistent Memory and NVDIMM Special Interest Group webcast on how applications can take advantage of Persistent Memory today with NVDIMM - the go-to Persistent Memory technology for boosting performance for next generation storage platforms. NVDIMM standards have paved the way to simple, plug-n-play solutions. If you're a developer or integrator who hasn't yet realized the benefits of NVDIMMs in your products, you will want to attend to learn about NVDIMM functionality, applications, and benefits. You'll come away with an understanding of how NVDIMMs fit into the persistent memory landscape.

While companies have been ditching traditional marketing methods in their race to capture the online-savvy millennials, no one is on their phone 24/7, and delivering brand messages out in the world is still vital to capturing mindshare.

Those first-gen marketing methods, including outdoor, tv, direct mail, and more, are still valuable and essential to building a stronger bottom line, especially when integrated as a vital part of an overarching marketing campaign, firing on all cylinders. That’s easier than ever, because traditional doesn’t mean old-school and analog anymore, and innovations in marketing technology don’t only apply to your online channels. You can apply your martech capabilities not just for tracking, measurement, and attribution, but to keep tabs on omnichannel competitor strategies, design the most effective campaign copy in every arena, create the most impactful rollouts between all your channels and more.

To find out how to integrate offline marketing channels with your online efforts, how marketing technology can bring those traditional methods into the twenty-first century, and more, don’t miss this VB Live event!

Registration is free.

Attend this webinar and learn:
* How to use martech to digitize offline channels
* How to integrate traditional marketing efforts into their newer tech-driven marketing stack
* The importance of combining online and offline marketing
* How to track offline conversions